Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

HP firmware still contains unpatched vulnerabilities

HP firmware still contains unpatched vulnerabilities

Researchers from security firm Binarly warned of unpatched vulnerabilities in HP firmware. Some of the vulnerabilities were reported to HP months ago. Affected hardware remains highly vulnerable. Binarly develops an AI-based security platform. The company's researchers recently warned of severa... Read more

date2 years ago
JumpCloud launches password manager for MSPs

JumpCloud launches password manager for MSPs

JumpCloud launched a password manager for IT administrators and managed service providers. JumpCloud develops identity, access and device management software. Each solution runs on the Open Directory Platform, a central environment for IT administrators and managed service providers (MSPs). The ... Read more

date2 years ago
GIFShell attacks Microsoft Teams users with GIFs

GIFShell attacks Microsoft Teams users with GIFs

GIFShell is attacking Microsoft Teams users by making them download malicious files on their system via GIFs. A new malware attack has been surfacing over the past few weeks. GIFShell was created to intercept Microsoft Teams and execute phishing attacks using GIFs. Although many people enjoy a g... Read more

date2 years ago
GTT well-positioned to provide SASE in a dynamic world

GTT well-positioned to provide SASE in a dynamic world

GTT is fully committed to SASE, or Secure Access Service Edge. It does so in its own way. We spoke with Mark de Haan, SVP Central Europe at GTT Communications. What makes Secure Connect, the SASE offering from GTT, unique? Why, as a customer, should you go for GTT and not for one of the many dozens... Read more

date2 years ago
AI advances cybersecurity, but also offers hackers opportunities

AI advances cybersecurity, but also offers hackers opportunities

Artificial Intelligence (AI) is becoming more dominant in the cyber space. It can ensure that systems and business environments become more secure. At the same time, hackers also know how to use artificial intelligence. What is currently going on around AI in the cyber arena? To what extent is it t... Read more

date2 years ago
‘Portugal’s army lost NATO documents in a hack’

‘Portugal’s army lost NATO documents in a hack’

The Portuguese Armed Forces General Staff Agency (EMGFA) reportedly fell victim to a hack that resulted in the theft of sensitive NATO papers, which are currently being sold on the dark web. EMGFA is the governmental agency responsible for controlling, planning and operating Portugal's armed fo... Read more

date2 years ago
Vulnerable SMBs prop up an IT supply chain riddled with ransomware

Vulnerable SMBs prop up an IT supply chain riddled with ransomware

A recent report by Trend Micro suggests that SMBs are the weak link in IT supply chains. Ransomware is one of the many threats that small and medium business enterprises (SMBs) face on an almost daily basis. Attacks can damage their reputation and wallet and bring their day-to-day operations to... Read more

date2 years ago
Cisco won’t address vulnerability in legacy VPN routers

Cisco won’t address vulnerability in legacy VPN routers

Cisco isn't planning on resolving a recently discovered vulnerability in its VPN router models for SMBs. The organization said the models reached end-of-life (EoL) status and won't be updated as a result. The vulnerability (CVE-2022-20923) was found in the RV110W, RV130, RV130W and RV215W. Acco... Read more

date2 years ago
Web-connected devices may have to comply with new EU security laws

Web-connected devices may have to comply with new EU security laws

According to a draft proposal obtained by Bloomberg, providers of internet-connected technology -- ranging from iPhones to baby monitors -- will be required to comply with new cybersecurity specifications in the European Union. Offendees risk getting fined and possibly having their products remove... Read more

date2 years ago
1 102 103 104 105 106 276